Secure outsourcing of DNA searching via finite automata M Blanton, M Aliasgari IFIP Annual Conference on Data and Applications Security and Privacy, 49-64, 2010 | 112 | 2010 |
Secure Computation on Floating Point Numbers. M Aliasgari, M Blanton, Y Zhang, A Steele NDSS, 2013 | 97 | 2013 |
Data-oblivious graph algorithms for secure computation and outsourcing M Blanton, A Steele, M Alisagari Proceedings of the 8th ACM SIGSAC symposium on Information, computer and ¡¦, 2013 | 88 | 2013 |
Analysis of reusability of secure sketches and fuzzy extractors M Blanton, M Aliasgari IEEE transactions on information forensics and security 8 (9), 1433-1445, 2013 | 52 | 2013 |
On the (non-) reusability of fuzzy sketches and extractors and security in the computational setting M Blanton, M Aliasgari Proceedings of the International Conference on Security and Cryptography, 68-77, 2011 | 36 | 2011 |
Secure outsourced computation of iris matching M Blanton, M Aliasgari Journal of Computer Security 20 (2-3), 259-305, 2012 | 30 | 2012 |
Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model M Aliasgari, M Blanton, F Bayatbabolghani International Journal of Information Security 16 (6), 577-601, 2017 | 20 | 2017 |
Secure computation of hidden markov models M Aliasgari, M Blanton 2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013 | 19 | 2013 |
Secure computation of biometric matching M Blanton, M Aliasgari Department of Computer Science and Engineering, University of Notre Dame ¡¦, 2009 | 15 | 2009 |
Security vulnerabilities in mobile health applications M Aliasgari, M Black, N Yadav 2018 IEEE Conference on Application, Information and Network Security (AINS ¡¦, 2018 | 7 | 2018 |
Secure fingerprint alignment and matching protocols F Bayatbabolghani, M Blanton, M Aliasgari, M Goodrich arXiv preprint arXiv:1702.03379, 2017 | 4 | 2017 |
Mobile Healthcare in an Increasingly Connected Developing World N Yadav, M Aliasgari, C Poellabauer International Journal of Privacy and Health Information Management (IJPHIM ¡¦, 2016 | 3 | 2016 |
Sesame: a secure and convenient mobile solution for passwords M Aliasgari, N Sabol, A Sharma 2015 First Conference on Mobile and Secure Services (MOBISECSERV), 1-5, 2015 | 3 | 2015 |
Recent advancements in microarchitectural security: Review of machine learning countermeasures H Sayadi, H Wang, T Miari, HM Makrani, M Aliasgari, S Rafatirad, ... 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems ¡¦, 2020 | 2 | 2020 |
Optimization and Decision Making for Route Selection as an Alternative of Google Maps Considering Sustainability R Amouhadi, V Veliz, V Balali, M Aliasgari Computing in Civil Engineering 2019: Smart Cities, Sustainability, and ¡¦, 2019 | 1 | 2019 |
Automated Detection of Sewer Pipe Structural Defects Using Machine Learning J Huang, KE Leung, R Verceles, W Chen, B Englert, M Aliasgari Proceedings of the Water Environment Federation 2017 (6), 4605-4615, 2017 | 1 | 2017 |
IOT-1-PASS-SECURITY: 1 (ONE)-PASS AUTHENTICATED KEY AGREEMENT PROTOCOL FOR ENERGY CONSTRAINT IOT APPLICATIONS. M Aliasgari, G Chan, M Mozumdar International Journal on Smart Sensing & Intelligent Systems 9 (2), 2016 | 1 | 2016 |
Ensuring Authentication and Security using Zero Knowledge Protocol for Wireless Sensor Network Applications M Mozumdar, M Aliasgari, SMV Venkata, SS Renduchintala International Journal of Computing and Digital Systems 5 (03), 2016 | 1 | 2016 |
Secure computation and outsourcing of biometric data M Aliasgari University of Notre Dame, 2013 | 1 | 2013 |
Rapid, Multi-vehicle and Feed-forward Neural Network based Intrusion Detection System for Controller Area Network Bus M Sami, M Ibarra, AC Esparza, S Al-Jufout, M Aliasgari, M Mozumdar 2020 IEEE Green Energy and Smart Systems Conference (IGESSC), 1-6, 2020 | | 2020 |